+612 9045 4394
 
CHECKOUT
The Best Damn IT Security Management Book Period : Book Period - Karim Vellani

The Best Damn IT Security Management Book Period

Book Period

Paperback Published: 1st November 2007
ISBN: 9781597492270
Number Of Pages: 960

Share This Book:

Paperback

$149.50
or 4 easy payments of $37.38 with Learn more
Ships in 7 to 10 business days

The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload.

Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.

Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious security professional's toolkit.

* An all encompassing book, covering general security management issues and providing specific guidelines and checklists
* Anyone studying for a security specific certification or ASIS certification will find this a valuable resource
* The only book to cover all major IT and security management issues in one place: disaster recovery, project management, operations management, and risk assessment

From Vulnerability to Patchp. 1
Windows of Vulnerabilityp. 3
Vulnerability Assessment 101p. 15
Vulnerability Assessment Toolsp. 37
Vulnerability Assessment: Step Onep. 53
Vulnerability Assessment: Step Twop. 67
Going Furtherp. 81
Vulnerability Managementp. 119
Vulnerability Management Toolsp. 135
Vulnerability and Configuration Managementp. 147
Regulatory Compliancep. 167
Tying It All Togetherp. 181
Network Security Evaluationp. 201
Introducing the INFOSEC Evaluation Methodologyp. 203
Before the Evaluation Startsp. 217
Setting Expectationsp. 239
Scoping the Evaluationp. 257
Legal Principles for Information Security Evaluationsp. 283
Building the Technical Evaluation Planp. 323
Starting Your Onsite Effortsp. 341
Network Discovery Activitiesp. 363
Collecting the Majority of Vulnerabilitiesp. 409
Fine-Tuning the Evaluationp. 443
The Onsite Closing Meetingp. 463
Post-Evaluation Analysisp. 475
Creating Measurements and Trending Resultsp. 493
Trending Metricsp. 513
Final Reportingp. 531
Summing Up the INFOSEC Evaluation Methodologyp. 549
Business Continuity & Disaster Recoveryp. 581
Business Continuity and Disaster Recovery Overviewp. 583
Project Initiationp. 615
Risk Assessmentp. 671
Business Impact Analysisp. 733
Mitigation Strategy Developmentp. 773
Business Continuity/Disaster Recovery Plan Developmentp. 799
Emergency Response and Recoveryp. 829
Training, Testing, and Auditingp. 845
BC/DR Plan Maintenancep. 869
BC/DR Checklistsp. 883
Indexp. 905
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9781597492270
ISBN-10: 1597492272
Series: Book Period
Audience: Professional
Format: Paperback
Language: English
Number Of Pages: 960
Published: 1st November 2007
Publisher: Syngress Media,U.S.
Country of Publication: US
Dimensions (cm): 23.5 x 19.1  x 4.8
Weight (kg): 1.6